【24h】

Differential Power Analysis of 8-Bit Datapath AES for IoT Applications

机译:物联网应用的8位数据路径AES的差分功率分析

获取原文
获取原文并翻译 | 示例

摘要

The security issue of Internet of Things (IoT) applications causes wide concern nowadays. Lightweight encryption circuits are preferred in IoT due to its severe restrictions of chip area and power consumption, among which, 8-bit datapath Advanced Encryption Standard (AES) is popular for its mature algorithm, compact architecture and low power consumption. However, it is also subject to the side channel analysis (SCA) attack, which is rarely mentioned. In this paper, a novel differential power analysis (DPA) attack method specialized for 8-bit datapath AES is proposed, which exploits the correlation between the power consumption of S-Box and processed data. The method can traverse all the possibilities. As a result, it is effective for almost all the existing 8-bit AES architecture in theory. The first round of encryption is adopted as the target round, avoiding the complicated computing in AES algorithm to reduce the cost of attack and increase the success rate and efficiency. The effectivity of this kind of method is verified by FPGA implementation on SAKURA-G board, with a minimum of 3681 power traces to crack the correct sub-key.
机译:如今,物联网(IoT)应用程序的安全性问题引起了广泛关注。轻量级加密电路由于对芯片面积和功耗的严格限制而在IoT中是首选,其中,8位数据路径高级加密标准(AES)因其成熟的算法,紧凑的结构和低功耗而广受欢迎。但是,它也容易受到侧信道分析(SCA)攻击,这很少提及。提出了一种专门针对8位数据路径AES的差分功率分析(DPA)攻击方法,该方法利用了S-Box功耗与处理后数据之间的相关性。该方法可以遍历所有可能性。结果,从理论上讲,它对几乎所有现有的8位AES体系结构都是有效的。采用第一轮加密作为目标轮回,避免了AES算法复杂的计算,降低了攻击成本,提高了成功率和效率。这种方法的有效性已通过在SAKURA-G板上的FPGA实现进行了验证,至少需要3681条电源走线才能破解正确的子密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号